Delete secrets Kubernetes ClusterRole warns about viewing secrets #6713
Replies: 5 comments
-
|
cc @chen-keinan |
Beta Was this translation helpful? Give feedback.
-
|
@evankanderson can you please add your expected results |
Beta Was this translation helpful? Give feedback.
-
|
I would expect no warnings -- users do not have access to read secrets. |
Beta Was this translation helpful? Give feedback.
-
|
Note that the only permission granted is I don't want to disable this warning altogether, but I'm having trouble how having only
Since no |
Beta Was this translation helpful? Give feedback.
-
|
(There might be an argument that could be constructed around granting only |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
ksv041
Description
Using trivy to scan a manifest with a ClusterRole that grants delete only on secrets leads to the following critical warning:
Reproduction Steps
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: # We expect that these resources will be managed by controllers, so "delete" # really allows "switch it off and on again" name: delete-controlled-resources rules: - apiGroups: [""] resources: ["secrets", "pods"] verbs: ["delete"]trivy fs --scanners misconfigon the file or a directory containing it, and get the warning aboveTarget
Filesystem
Scanner
Misconfiguration
Target OS
No response
Debug Output
Version
Checklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions